US20090019182A1 - Behavioral predictions based on network activity locations - Google Patents

Behavioral predictions based on network activity locations Download PDF

Info

Publication number
US20090019182A1
US20090019182A1 US11/776,488 US77648807A US2009019182A1 US 20090019182 A1 US20090019182 A1 US 20090019182A1 US 77648807 A US77648807 A US 77648807A US 2009019182 A1 US2009019182 A1 US 2009019182A1
Authority
US
United States
Prior art keywords
geographical location
profile
network
activity source
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/776,488
Other versions
US7958228B2 (en
Inventor
Soren Riise
Devesh Patel
Ramesh G. Pai
Mark Nicholas Law
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
R2 Solutions LLC
Altaba Inc
Original Assignee
Yahoo Inc until 2017
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yahoo Inc until 2017 filed Critical Yahoo Inc until 2017
Priority to US11/776,488 priority Critical patent/US7958228B2/en
Assigned to YAHOO! INC. reassignment YAHOO! INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LAW, MARK NICHOLAS, PAI, RAMESH G., PATEL, DEVESH, RIISE, SOREN
Priority to PCT/US2008/067902 priority patent/WO2009009284A2/en
Priority to TW097124691A priority patent/TWI369617B/en
Publication of US20090019182A1 publication Critical patent/US20090019182A1/en
Application granted granted Critical
Publication of US7958228B2 publication Critical patent/US7958228B2/en
Assigned to EXCALIBUR IP, LLC reassignment EXCALIBUR IP, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YAHOO! INC.
Assigned to YAHOO! INC. reassignment YAHOO! INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EXCALIBUR IP, LLC
Assigned to EXCALIBUR IP, LLC reassignment EXCALIBUR IP, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YAHOO! INC.
Assigned to STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT reassignment STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: ACACIA RESEARCH GROUP LLC, AMERICAN VEHICULAR SCIENCES LLC, BONUTTI SKELETAL INNOVATIONS LLC, CELLULAR COMMUNICATIONS EQUIPMENT LLC, INNOVATIVE DISPLAY TECHNOLOGIES LLC, LIFEPORT SCIENCES LLC, LIMESTONE MEMORY SYSTEMS LLC, MERTON ACQUISITION HOLDCO LLC, MOBILE ENHANCEMENT SOLUTIONS LLC, MONARCH NETWORKING SOLUTIONS LLC, NEXUS DISPLAY TECHNOLOGIES LLC, PARTHENON UNIFIED MEMORY ARCHITECTURE LLC, R2 SOLUTIONS LLC, SAINT LAWRENCE COMMUNICATIONS LLC, STINGRAY IP SOLUTIONS LLC, SUPER INTERCONNECT TECHNOLOGIES LLC, TELECONFERENCE SYSTEMS LLC, UNIFICATION TECHNOLOGIES LLC
Assigned to R2 SOLUTIONS LLC reassignment R2 SOLUTIONS LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EXCALIBUR IP, LLC
Assigned to CELLULAR COMMUNICATIONS EQUIPMENT LLC, INNOVATIVE DISPLAY TECHNOLOGIES LLC, UNIFICATION TECHNOLOGIES LLC, MOBILE ENHANCEMENT SOLUTIONS LLC, STINGRAY IP SOLUTIONS LLC, SUPER INTERCONNECT TECHNOLOGIES LLC, NEXUS DISPLAY TECHNOLOGIES LLC, PARTHENON UNIFIED MEMORY ARCHITECTURE LLC, SAINT LAWRENCE COMMUNICATIONS LLC, BONUTTI SKELETAL INNOVATIONS LLC, MONARCH NETWORKING SOLUTIONS LLC, AMERICAN VEHICULAR SCIENCES LLC, LIMESTONE MEMORY SYSTEMS LLC, ACACIA RESEARCH GROUP LLC, TELECONFERENCE SYSTEMS LLC, LIFEPORT SCIENCES LLC, R2 SOLUTIONS LLC reassignment CELLULAR COMMUNICATIONS EQUIPMENT LLC RELEASE OF SECURITY INTEREST IN PATENTS Assignors: STARBOARD VALUE INTERMEDIATE FUND LP
Assigned to R2 SOLUTIONS LLC reassignment R2 SOLUTIONS LLC CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED ON REEL 053654 FRAME 0254. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST GRANTED PURSUANT TO THE PATENT SECURITY AGREEMENT PREVIOUSLY RECORDED. Assignors: STARBOARD VALUE INTERMEDIATE FUND LP
Assigned to STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT reassignment STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 052853 FRAME: 0153. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: R2 SOLUTIONS LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Definitions

  • the present invention relates to systems and methods for predicting future behaviors based on past network activities. More specifically, the present invention relates to systems and methods for constructing time-based behavior pattern profiles with respect to one or more geographical locations based on past network activities and predicting future behavior patterns based on the profiles.
  • the Internet has brought new opportunities to businesses around the world. Most importantly, geographical locations are no longer a significant restriction or limitation when conducting business transactions. More and more consumers enjoy the convenience of purchasing services and/or merchandise on the Internet from companies both close and afar, and consequently have much greater selections of services and/or merchandise to choose from. Many purely Internet-based companies have grown over the years into successful international corporations. These companies provide various types of services and/or merchandise on the Internet. For example, Yahoo!® Inc., one of the well-known Internet services companies, provides a full range of products and services, such as search engine, electronic mail (e-mail), news, message, travel, etc., to millions of people around the world.
  • Internet-based companies conduct their business via the Internet: services are provided over the Internet, merchandise is sold over the Internet, information is exchanged over the Internet, etc. Often, these are done through the World Wide Web and/or emails. For example, people may access Yahoo!® search engine, Yahoo!® Mail, and other Yahoo!® services and/or products using a web browser, such as Windows Internet Explorer developed by Microsoft® Corp. or Firefox® developed by Mozilla® Corp. It is no longer relevant where a person is located in the physical world, for as long as the person has access to the Internet, the person has access to the services, merchandise, and information provided online by the companies.
  • the companies are able to provide services and/or information tailored specifically to the needs of the customers based on where the customers are located, what the customers are doing, and other relevant factors at a particular time. For example, if a customer is shopping at a local grocery store, it may be desirable to send that customer information on products offered at that grocery store. In addition, it may also be desirable if the companies are able to anticipate the future needs of the customers and provide the appropriate information and/or services to the customers based on the expected future needs at the appropriate times. For example, if a customer generally takes a vacation every year during the summer months, it may be desirable to provide that customer with tourism information, such as possible vacation destinations or vacation package offers, shortly before each summer season.
  • tourism information such as possible vacation destinations or vacation package offers
  • the present invention relates to systems and methods for predicting future behaviors based on past network activities.
  • a computer-implemented method for constructing network activity profiles comprises the following: obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
  • a computer-implemented method for predicting future behaviors which comprises the following: constructing at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predicting future behaviors of the activity source based on the at least one profile.
  • a computer program product for constructing network activity profiles comprising a computer-readable medium having a plurality of computer program instructions stored therein.
  • the plurality of computer program instructures are operable to cause at least one computing device to: obtain a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determine a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and construct at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
  • a computer program product predicting future behaviors comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to: construct at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predict future behaviors of the activity source based on the at least one profile.
  • FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles.
  • FIG. 2 is a diagram that illustrates relationships between network activity profiles and network activity records.
  • FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.
  • FIG. 4 is a graphical illustration of a sample weekly profile.
  • FIG. 5 is a graphical illustration of a sample monthly profile.
  • FIG. 6 is a graphical illustration of a sample yearly profile.
  • FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented.
  • the Internet may be accessed from different geographical locations around the world using various methods. Sometimes, certain methods may be more suitable for accessing particular types of information available on the Internet, while other times one method may be used for accessing different types of information.
  • different types of electronic devices may be used to access the Internet. For example, web pages may be viewed using a web browser. Emails may be retrieved and/or sent using a web browser or an email application program. Files may be uploaded and/or downloaded using a web browser or an application program implementing the File Transfer Protocol (FTP).
  • FTP File Transfer Protocol
  • the various types of software programs for accessing the Internet may be executed on a computer or wireless devices such as a personal digital assistant (PDA) or a mobile telephone.
  • PDA personal digital assistant
  • the computer may be a desktop computer or a notebook computer.
  • the computer may be connected to the Internet via a cable, such as an Ethernet cable or a telephone cable, or wirelessly through various types of networks.
  • the PDA or the mobile telephone usually connect to the Internet wirelessly but may also be through various types of networks, such as a mobile telephone network.
  • a record may be made of the network activities conducted by the person.
  • the record may include various pieces of information describing the person's network activities. For example, a unique identification (ID) may indicate the source of the network activities; a network endpoint address, such as an Internet Protocol (IP) address, may indicate from where the Internet interaction originates; and an indication of time, such as a timestamp, may indicate when the network activities are conducted. Other relevant information may also be included in the record.
  • ID unique identification
  • IP Internet Protocol
  • a unique cookie may be assigned to each web browser, and if the person uses a web browser to access the Internet (e.g., viewing web pages), a browser-unique cookie may be used identify the web browser, which is one type of Internet interaction source.
  • people may establish online accounts (i.e., user accounts) at various websites, and a unique cookie may be assigned to each user account. If the person logs into his or her online account at a particular website, the user account-unique cookie may be used to identify the person conducting the network activities.
  • profiles may be constructed for the activity sources based on their respective network activity records.
  • Each profile may describe a time-based behavior pattern for a particular activity source.
  • these profiles may be used to predict future behaviors for the activity sources.
  • FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles.
  • multiple network activity records associated with an activity source may be determined.
  • the records may cover a period of time.
  • each network activity record may include an activity source-unique ID, a network endpoint address, and a time indication.
  • Raw data describing a person's interaction with the Internet may be collected and stored for a particular period of time. These data may include unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information.
  • unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information.
  • IP addresses e.g., IP addresses
  • time indications indicating when the Internet interactions occur e.g., timestamps
  • a particular website may implement software programs of specific functionalities for collecting and storing the data whenever people access that website.
  • the collected raw data may need to be processed first (e.g., filtered, categorized, correlated, aggregated, etc.) to obtain the network activity records. For example, each set of IP address and timestamp is associated with the appropriate activity source ID. Duplicate pieces of data and/or irrelevant data are filtered out and discarded or ignored. Again, appropriate functionalities may be implemented using software programs.
  • processing the raw data multiple network activity records may be obtained, and each record may include an activity source ID, an IP address, and a timestamp.
  • Table 1 includes several sample representations of the network activity records for a particular activity source.
  • each row represents a sample network activity record consisting of an activity source ID, an IP address, and a timestamp.
  • the activity source ID shown in Table 1 may be a web browser-unique cookie or a user account-unique cookie. If the activity source ID is a web browser-unique cookie, it indicates a particular web browser has been used to access the Internet. Since generally a particular web browser is executed on the same electronic device (e.g., computer or PDA), this implies that the same electronic device has been used to interact with the Internet. However, different people may share that particular device and use the same web browser to access the Internet at different times. Thus, in this case, the records may represent network activities conducted by multiple people.
  • the activity source ID is a user account-unique cookie, it generally implies that the same person has conducted the network activities represented by the records, since normally only the owner of a user account has the password to that account and may be able to log into the account. However, it is possible, although unlikely, that multiple people may share the same user account or another person may log into the owner's user account without the owner's permission. In this case, it is still possible that the records may represent network activities conducted by multiple people.
  • the sample records shown in Table 1 describe Internet activities conducted over a period of approximately three months.
  • the timestamps from the records indicate when the network activities occur.
  • different formats may be used to represent the timestamp variable, and the format shown in Table 1 (i.e., year, month, day, hour, minute, and second) is merely an example. It is very likely that different implementations of the method may choose different formats to represent the timestamp variable.
  • the IP addresses from the records indicate from where the network activities originate. In other words, the IP addresses, which may be either static or dynamic, are the IP addresses assigned to the electronic devices (e.g., router, computer, etc.) used for accessing the Internet.
  • IP address belonging to that record is determined using the IP address belonging to that record.
  • Various methods for determining geographical locations of an IP address are known. For example, various versions of software programs are designed to trace an IP addresses to their corresponding geographical locations. Lookup tables mapping IP addresses to physical locations are often stored on various network servers, particularly servers maintained by Internet Service Providers (ISP), which may be used to look up geographical locations for a given IP address.
  • ISP Internet Service Providers
  • Different levels of precision (i.e., granularity) of geographical locations may be determined for each IP address. For example, a particular IP address may be mapped to a country, a state or province, a county, a city, a street, a specific address, a direct marketing area (DMA), etc.
  • DMA direct marketing area
  • one or more geographical locations of different levels of granularity may be determined for each IP address from the network activity records. For example, a particular implementation of the method may choose to always determine the most granular locations possible for the IP addresses, while another implementation may choose to only determine the geographical locations corresponding to the IP addresses within a city. Yet another implementation may choose to determine geographical locations of different precisions for the IP addresses depending on various factors, such as the records available and the behavior profiles to be constructed.
  • IP addresses it is also possible for multiple IP addresses to be mapped to the same geographical location, if they are physically located nearby. For example, one city may have multiple ISPs, each having a different IP address. If a person interacts with the Internet through more than one ISP located in the same city, the network activity records may show different IP addresses mapped to the same city.
  • the determined geographical locations are associated with their corresponding IP addresses and may be stored along with the records.
  • Table 1 three different IP addresses, 216.109.112.135, 209.73.168.74, and 124.83.139.192, are shown in the records. Two of the IP addresses, 216.109.112.135 and 209.73.168.74, are matched to the same city: United States, California, Sunnyvale, while the third IP address, 124.83.139.192, is located in Japan.
  • Table 2 shows the records of Table 1 with corresponding geographical locations determined based on the IP addresses. In this example, the geographical locations for each IP address are determined to the most granular level. Thus, for the two IP addresses located in the United States, the corresponding geographical locations are matched to within the city, and for the IP address located in Japan, the corresponding geographical location is matched only to within the country.
  • one or more profiles for the activity source may be constructed using the network activity records and the geographical locations corresponding to the IP addresses in the records.
  • the profiles describe or represent time-based behavior patterns with respect to the different geographical locations and may include information such as the geographical locations and timestamps indicating the time for the network activities conducted at each of the geographical locations.
  • the profiles may cover different time periods, such as network activities conducted within a day, a week, a month, a year, and any other desirable time periods. Generally, in order to construct a profile covering a specific time period, network activity records should be available covering that time period.
  • one or more daily profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each different location during a day.
  • one or more weekly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a week.
  • one or more monthly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a month.
  • one or more yearly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per month during a year. Examples of daily, weekly, monthly, and yearly profiles are explained in more detail below in FIGS. 3-6 respectively.
  • future behaviors for the activity source may be predicted with respect to the geographical locations. For example, based on a daily profile representing network activities during a work day, future behaviors may be predicted for other work days. A similar concept applies to weekly, monthly, and yearly profiles.
  • appropriate information may be provided to the activity source at the suitable geographical locations during the suitable time periods based on the predicted or expected future behaviors. The appropriateness of the information may depend on the types of predicted future behaviors considered.
  • examples of 180 and 190 will be explained in more detail below in FIGS. 3-6 with respect to the daily, weekly, monthly, and yearly profiles.
  • FIG. 2 is a diagram that illustrates relationships between the network activity records and profiles. To simplify the discussion, only five network activity records 200 are shown in FIG. 2 . In practice, it is more likely that hundreds, even thousands of network activity records for a single activity source may be used to construct the profiles for that activity source.
  • Each network activity record 200 includes at least an indication, such as a unique ID, identifying the activity source, an IP address from where the activity originates, and a timestamp indicating the time of the activity. Of course, other information may also exist in the records.
  • One or more geographical locations 210 are determined for each IP address and associated with the corresponding record 200 .
  • one or more types of profiles i.e., daily profile 220 , weekly profile 221 , monthly profile 222 , and/or yearly profile 223 ) may be constructed based on the records 200 and the corresponding geographical locations 210 .
  • the same type of profiles 220 , 221 , 222 , 223 may be constructed multiple times, each for a different time period.
  • two daily profiles 220 may be constructed, one representing a weekday and one representing a weekend day.
  • twelve monthly profiles 222 may be constructed, each representing a different month of the year.
  • Information from one or more records may be used to construct the profiles. In other words, information from all the available records is not necessarily always used to generate each profile. Sometimes, for a particular profile, such as a daily profile, only a few records are used. Other times, more records are used, such as for constructing a monthly or yearly profile.
  • FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.
  • FIG. 3A shows a sample weekday profile
  • FIG. 3B shows a sample weekend day profile. Since people are unlikely to be interacting with the Internet all day long, the daily profiles would only show those time periods when the activity source is actually accessing the Internet.
  • FIG. 3A there are five distinct time periods during which the activity source is accessing the Internet: from 07:00 to 07:30, from 08:00 to 12:00, from 13:00 to 18:00, from 19:00 to 19:30, and finally from 21:00 to 22:00.
  • the activities originate from geographical location 300 .
  • the activity source ID is a user account-unique cookie, which generally implies that the network activity records represent a person logging into his or her user account, and since this is a profile for a weekday, the pattern of the network activities may indicate that geographical location 300 may be the person's home, geographical location 301 may be the person's office, and geographical location 302 may be a place where the person goes to after work, such as a restaurant, a coffee shop, a theatre, or a club. Based on the time periods during which there are network activities at each of the distinct geographical locations 300 , 301 , 302 , a percentage distribution of the amount of time during which there are network activities originated from each location during the weekday may be calculated.
  • a time-based behavior pattern may be determined with respect to the distinct geographical locations.
  • a geographical location may be associated with each period of time when there are network activities.
  • the behavior pattern may indicate that the person leaves home for work around 07:30, spends the majority of the day (i.e., from approximately 8:00 to approximate 18:00) at the office, spends some time out during the evening, and arrives home no later than 21:00.
  • future behaviors for activity source during a weekday may be predicted. For example, a person is likely to spend approximately the same period of time at work during each weekday. Similarly, the person is likely to leave home for work and return home at approximately the same time each weekday. It is also possible that the person may frequent a few favorite establishments from time to time (e.g., having dinners at a favorite restaurant or buying grocery from the local grocery store).
  • Appropriate information corresponding to the person's daily activities may be provided to the person conducting the network activities based on the predicted or expected future behaviors. For example, assuming geographical location 302 is a night club, information may be provided to the person earlier in the afternoon or shortly before the person leaves work about the events that will likely take place at the night club (i.e., geographical location 302 ) later that evening. Or, if geographical location 302 is a grocery store, information about the special offers at the store may be sent to the person either shortly before the person is likely or expected to go to the store or while the person is likely at the store. If the locations of the person's home and office are known, the route the person takes to and from work may be determined. During early morning and late afternoon on weekdays, traffic information about the route may be provided. Other information relating to daily activities may include weather, news, etc.
  • information may be sent via email, instant message, voice message, etc.
  • FIG. 3B there are three distinct time periods during which the activity source is accessing the Internet: from 08:00 to 11:30, from 15:30 to 16:00, and from 19:00 to 20:00. Again, based on the geographical locations determined using the IP addresses in the network activity records, there are two distinct geographical locations from where the network activities originate. From 08:00 to 11:30 and 19:00 to 20:00, the activities originate from geographical location 300 . From 15:30 to 16:00, the activities originate from geographical location 303 .
  • the time-based behavior pattern determined from the profile shown in FIG. 3B may indicate that on a weekend day, the person spends the morning at home, goes out in the afternoon, and spends at least some time during the evening again at home.
  • a person may not access the Internet for long periods of time. The person may only quickly check his or her emails from time to time.
  • there are network activities originated from geographical location 303 for approximately half an hour (from 15:30 to 16:00) the person may actually be at geographical location 303 for a much longer time period.
  • a person's behavior may not be as regular on the weekends as during the week. Nevertheless, it is still possible to predict the person's future behavior pattern, especially if multiple weekend day profiles are used. For example, several weekend day profiles may be constructed, each representing a different weekend day, and future weekend day behaviors may be predicted based on multiple weekend day profiles, perhaps by aggregating or averaging the information from these multiple profiles in order to obtain a more precise behavior pattern.
  • the daily profiles show time-based behavior pattern for an activity source during a single day.
  • a weekly profile shows time-based behavior pattern for an activity source for each day of the week during an entire week.
  • FIG. 4 is a graphical illustration of a sample weekly profile. Time-based distributions for the network activities originated from each of the distinct geographical locations are described for each day of the week. From the sample weekly profile shown in FIG. 4 , there appears to be more network activities during the week than on the weekend, perhaps due to the fact that the person often spends time on other activities on the weekends.
  • the person spends a majority of time at work (i.e., geographical location 301 ). The person may occasionally go out on weekday evenings. However, on the weekends, the person may visit places for leisure or entertainment more frequently (e.g., geographical locations 302 and 303 ). Again, future behavior patterns describing the activity source's weekly activities may be predicted using one or more weekly profiles, and information about the person's weekly activities, such as leisure time activities, may be provided to the person based on the predicted or expected future activities.
  • information about places that the person likes to visit on the weekends may be provided to the person, perhaps on each Friday. If the person frequently goes to a movie theatre on the weekends, information about movies that will be played at the theatre during the upcoming weekend may be sent to the person some time during the week. If the person likes to shop at a mall on the weekends, information about special offers or advertisement from the stores at the mall may be sent to the person at the appropriate time (e.g., either shortly before or while the person is shopping).
  • more than one weekly profile may be constructed for an activity source. These multiple weekly profiles may represent different weeks of a month, or weeks of multiple months.
  • FIG. 5 is a graphical illustration of a sample monthly profile.
  • time distributions for network activities originated from each distinct geographical location are described for each day of the month for an entire month, which in turn shows the behavior pattern of the network activity source during the month.
  • the profile indicates that the activity source repeats approximately the same behavior pattern: spending most of the weekdays at the office (geographical location 301 ), occasionally having some leisure time by visiting various establishments on weekday evenings or weekends (geographical locations 302 and 303 ), and spending other times at home (geographical location 300 ).
  • the profile indicates that the activity source is at a new geographical location 304 .
  • This may imply or indicate that the activity source travels to another site, such as a different office location of the company or a customer site, for business on the third week of the week.
  • geographical location 304 may be the office of the business site the activity source visits, since the activity source is there during normal business hours.
  • Geographical location 305 may be a hotel where the activity source stays during the week, and geographical location 306 may be an airport.
  • One or more monthly profiles may be used to predict the activity source's future behavior pattern on a monthly basis.
  • the activity source may visit the alternative office site (geographical location 304 ) to take other business trips periodically, such as once a month or once every few months.
  • Information relating to monthly activities shown in the monthly profile may be provided to the activity source. For example, if based on the monthly profile, it may be predicted that the activity source will take a business trip soon, travel information, such as flights, hotels, restaurants, etc. may be sent to the activity source some time before the scheduled time for the trip.
  • more than one monthly profile may be constructed for an activity source. These multiple monthly profiles may represent different months of a year, or months of different years.
  • FIG. 6 is a graphical illustration of a sample yearly profile. Time distributions for network activities originated from each distinct geographical location are described for each month of the year for an entire year, which in turn shows the behavior pattern of the network activity source during the year.
  • the activity source normally spends most of the time between home (geographical location 300 ) and office (geographical location 301 ). Once every three months, the activity source generally visits an alternative office site (geographical location 304 ) for a week and stays at a hotel (geographical location 305 ) during the visit.
  • the activity source visits another new geographical location 307 . It may be determined that geographical location 307 is a place the activity source visits during vacation time, such as a beach resort or a city in a different country. Similarly, during the last week of December, the activity source also visits a new geographical location 308 , which may be a ski resort or a home of a friend of family whom the activity source visits during the holiday season.
  • the yearly profile may be used to predict future behaviors for the activity source on a yearly basis.
  • Information relating to the activity source's yearly activities may be provided to the activity source at appropriate times. For example, when it gets close to the time when the activity source is expected to take a vacation, tourism related information, such as resorts, possible destinations, flights, hotels, services, etc. may be provided to the activity source. When it gets close to the holiday seasons, information on merchandise as possible gift ideas as well as travel information may be provided to the activity source.
  • multiple yearly profiles may be constructed for an activity source.
  • FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented.
  • the various aspects of the invention may be practiced in a wide variety of network environments (represented by network 217 ) including, for example, TCP/IP-based networks, telecommunications networks, wireless networks, etc.
  • the computer program instructions with which embodiments of the invention are implemented may be stored in any type of computer-readable media, and may be executed according to a variety of computing models including, for example, on a stand-alone computing device, or according to a distributed computing model in which various of the functionalities described herein may be effected or employed at different locations.
  • the software program implementing various embodiments may be executed on the server 208 .
  • websites may be hosted on various servers 708 .
  • Software programs designed to collect network activity information e.g., activity source ID, IP address, timestamp
  • the collected information may be stored in one or more databases 714 communicatively linked to the servers 708
  • interaction with the Internet 712 may be conducted using various devices, such as desktop computers 703 , notebook computers 702 , mobile telephones 704 , PDAs 705 , etc.
  • the devices may be connected to the Internet via cables and perhaps through a router 709 or wirelessly.
  • a web browser may be executed on the devices and used to view the web page, each web browser having a unique ID that may be used to identify the web browser (i.e., activity source).

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A computer-implemented method for constructing network activity profiles is provided, which comprises the following: obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to systems and methods for predicting future behaviors based on past network activities. More specifically, the present invention relates to systems and methods for constructing time-based behavior pattern profiles with respect to one or more geographical locations based on past network activities and predicting future behavior patterns based on the profiles.
  • 2. Background of the Invention
  • The Internet has brought new opportunities to businesses around the world. Most importantly, geographical locations are no longer a significant restriction or limitation when conducting business transactions. More and more consumers enjoy the convenience of purchasing services and/or merchandise on the Internet from companies both close and afar, and consequently have much greater selections of services and/or merchandise to choose from. Many purely Internet-based companies have grown over the years into successful international corporations. These companies provide various types of services and/or merchandise on the Internet. For example, Yahoo!® Inc., one of the well-known Internet services companies, provides a full range of products and services, such as search engine, electronic mail (e-mail), news, message, travel, etc., to millions of people around the world.
  • Naturally, Internet-based companies conduct their business via the Internet: services are provided over the Internet, merchandise is sold over the Internet, information is exchanged over the Internet, etc. Often, these are done through the World Wide Web and/or emails. For example, people may access Yahoo!® search engine, Yahoo!® Mail, and other Yahoo!® services and/or products using a web browser, such as Windows Internet Explorer developed by Microsoft® Corp. or Firefox® developed by Mozilla® Corp. It is no longer relevant where a person is located in the physical world, for as long as the person has access to the Internet, the person has access to the services, merchandise, and information provided online by the companies.
  • On the other hand, the types of services and/or information a person desires or needs often depends the person's physical location at a given time. For example, when a person is working, he or she may search for work-related information on the Internet. When a person is shopping, he or she may desire information on discounts or special deals offered by the stores nearby. When a person is traveling, he or she may need information on the destination, such as maps, tourist attractions, hotels, restaurants, transportations, etc.
  • In order to better serve their customers, it may be desirable if the companies are able to provide services and/or information tailored specifically to the needs of the customers based on where the customers are located, what the customers are doing, and other relevant factors at a particular time. For example, if a customer is shopping at a local grocery store, it may be desirable to send that customer information on products offered at that grocery store. In addition, it may also be desirable if the companies are able to anticipate the future needs of the customers and provide the appropriate information and/or services to the customers based on the expected future needs at the appropriate times. For example, if a customer generally takes a vacation every year during the summer months, it may be desirable to provide that customer with tourism information, such as possible vacation destinations or vacation package offers, shortly before each summer season.
  • Accordingly, what are needed are systems and methods to address the above-identified issues.
  • SUMMARY OF THE INVENTION
  • Broadly speaking, the present invention relates to systems and methods for predicting future behaviors based on past network activities.
  • In one embodiment, a computer-implemented method for constructing network activity profiles is provided, which comprises the following: obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
  • In another embodiment, a computer-implemented method for predicting future behaviors, which comprises the following: constructing at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predicting future behaviors of the activity source based on the at least one profile.
  • In another embodiment, a computer program product for constructing network activity profiles comprising a computer-readable medium having a plurality of computer program instructions stored therein is provided. The plurality of computer program instructures are operable to cause at least one computing device to: obtain a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction; for each record, determine a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and construct at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
  • In another embodiment, a computer program product predicting future behaviors comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to: construct at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and each profile comprises a time-based behavior pattern associated with the at least one geographical location; and predict future behaviors of the activity source based on the at least one profile.
  • These and other features, aspects, and advantages of the invention will be described in more detail below in the detailed description and in conjunction with the following figures.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
  • FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles.
  • FIG. 2 is a diagram that illustrates relationships between network activity profiles and network activity records.
  • FIGS. 3A and 3B are two graphical illustrations of sample daily profiles.
  • FIG. 4 is a graphical illustration of a sample weekly profile.
  • FIG. 5 is a graphical illustration of a sample monthly profile.
  • FIG. 6 is a graphical illustration of a sample yearly profile.
  • FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention will now be described in detail with reference to a few preferred embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures have not been described in detail in order to not unnecessarily obscure the present invention. In addition, while the invention will be described in conjunction with the particular embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. To the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
  • The Internet may be accessed from different geographical locations around the world using various methods. Sometimes, certain methods may be more suitable for accessing particular types of information available on the Internet, while other times one method may be used for accessing different types of information. Similarly, different types of electronic devices may be used to access the Internet. For example, web pages may be viewed using a web browser. Emails may be retrieved and/or sent using a web browser or an email application program. Files may be uploaded and/or downloaded using a web browser or an application program implementing the File Transfer Protocol (FTP). The various types of software programs for accessing the Internet may be executed on a computer or wireless devices such as a personal digital assistant (PDA) or a mobile telephone. The computer may be a desktop computer or a notebook computer. The computer may be connected to the Internet via a cable, such as an Ethernet cable or a telephone cable, or wirelessly through various types of networks. The PDA or the mobile telephone usually connect to the Internet wirelessly but may also be through various types of networks, such as a mobile telephone network.
  • Each time a person interacts with or accesses the Internet, a record may be made of the network activities conducted by the person. The record may include various pieces of information describing the person's network activities. For example, a unique identification (ID) may indicate the source of the network activities; a network endpoint address, such as an Internet Protocol (IP) address, may indicate from where the Internet interaction originates; and an indication of time, such as a timestamp, may indicate when the network activities are conducted. Other relevant information may also be included in the record.
  • There may be different types of Internet access or activities source, and examples may include the person interacting with the Internet, the web browser used by the person to access the Internet, etc. In one or more embodiments, a unique cookie may be assigned to each web browser, and if the person uses a web browser to access the Internet (e.g., viewing web pages), a browser-unique cookie may be used identify the web browser, which is one type of Internet interaction source. Similarly, people may establish online accounts (i.e., user accounts) at various websites, and a unique cookie may be assigned to each user account. If the person logs into his or her online account at a particular website, the user account-unique cookie may be used to identify the person conducting the network activities.
  • Over time, records of Internet interactions or activities may be collected and stored, and profiles may be constructed for the activity sources based on their respective network activity records. Each profile may describe a time-based behavior pattern for a particular activity source. Furthermore, these profiles may be used to predict future behaviors for the activity sources.
  • FIG. 1 is a flowchart of a method that constructs network activity profiles representing time-based behavior patterns with respect to geographical locations and predicts future behaviors based on the profiles. At 110, from a collection of data, multiple network activity records associated with an activity source may be determined. The records may cover a period of time. And each network activity record may include an activity source-unique ID, a network endpoint address, and a time indication.
  • Raw data describing a person's interaction with the Internet may be collected and stored for a particular period of time. These data may include unique IDs identifying the source of the Internet interactions (e.g., browser-unique cookies or user account-unique cookies), network endpoint addresses from where the Internet interactions originate (e.g., IP addresses), time indications indicating when the Internet interactions occur (e.g., timestamps), and other relevant information. There are different methods for collecting such data. For example, a particular website may implement software programs of specific functionalities for collecting and storing the data whenever people access that website.
  • The collected raw data may need to be processed first (e.g., filtered, categorized, correlated, aggregated, etc.) to obtain the network activity records. For example, each set of IP address and timestamp is associated with the appropriate activity source ID. Duplicate pieces of data and/or irrelevant data are filtered out and discarded or ignored. Again, appropriate functionalities may be implemented using software programs. By processing the raw data, multiple network activity records may be obtained, and each record may include an activity source ID, an IP address, and a timestamp. The following table, Table 1, includes several sample representations of the network activity records for a particular activity source.
  • TABLE 1
    Sample Network Activity Records
    Activity Source ID IP Address Timestamp
    61867037 216.109.112.135 2007-01-05 10:43:20
    61867037 216.109.112.135 2007-01-12 18:51:12
    61867037 209.73.168.74 2007-01-31 16:15:25
    61867037 124.83.139.192 2007-02-10 23:54:14
    61867037 124.83.139.192 2007-02-17 12:42:21
    61867037 216.109.112.135 2007-02-21 09:04:14
    61867037 209.73.168.74 2007-03-03 09:52:31
    61867037 216.109.112.135 2007-03-17 14:20:30
    61867037 124.83.139.192 2007-03-28 08:35:40
  • In Table 1, each row represents a sample network activity record consisting of an activity source ID, an IP address, and a timestamp. The activity source ID shown in Table 1 may be a web browser-unique cookie or a user account-unique cookie. If the activity source ID is a web browser-unique cookie, it indicates a particular web browser has been used to access the Internet. Since generally a particular web browser is executed on the same electronic device (e.g., computer or PDA), this implies that the same electronic device has been used to interact with the Internet. However, different people may share that particular device and use the same web browser to access the Internet at different times. Thus, in this case, the records may represent network activities conducted by multiple people.
  • On the other hand, if the activity source ID is a user account-unique cookie, it generally implies that the same person has conducted the network activities represented by the records, since normally only the owner of a user account has the password to that account and may be able to log into the account. However, it is possible, although unlikely, that multiple people may share the same user account or another person may log into the owner's user account without the owner's permission. In this case, it is still possible that the records may represent network activities conducted by multiple people.
  • The sample records shown in Table 1 describe Internet activities conducted over a period of approximately three months. The timestamps from the records indicate when the network activities occur. Of course different formats may be used to represent the timestamp variable, and the format shown in Table 1 (i.e., year, month, day, hour, minute, and second) is merely an example. It is very likely that different implementations of the method may choose different formats to represent the timestamp variable. In addition, the IP addresses from the records indicate from where the network activities originate. In other words, the IP addresses, which may be either static or dynamic, are the IP addresses assigned to the electronic devices (e.g., router, computer, etc.) used for accessing the Internet.
  • Once records that cover a period of time are obtained for a particular activity source, at 120, for each record, one or more geographical locations are determined using the IP address belonging to that record. Various methods for determining geographical locations of an IP address are known. For example, various versions of software programs are designed to trace an IP addresses to their corresponding geographical locations. Lookup tables mapping IP addresses to physical locations are often stored on various network servers, particularly servers maintained by Internet Service Providers (ISP), which may be used to look up geographical locations for a given IP address.
  • Additional examples of systems and methods for associating one or more geographical locations with an IP address are disclosed in U.S. patent application Ser. No. 11/729,365 (Attorney Docket No. Y01949US00) and U.S. patent application Ser. No. 11/729,364 (Attorney Docket No. Y01951US00), both titled “System and Method for Associating a Geographical Location with an Internet Protocol Address,” which are incorporated by reference to the extent not inconsistent with the claimed aspects and the disclosure herein.
  • Different levels of precision (i.e., granularity) of geographical locations may be determined for each IP address. For example, a particular IP address may be mapped to a country, a state or province, a county, a city, a street, a specific address, a direct marketing area (DMA), etc. Depending on the requirements or preferences of the specific implementations of the method, one or more geographical locations of different levels of granularity may be determined for each IP address from the network activity records. For example, a particular implementation of the method may choose to always determine the most granular locations possible for the IP addresses, while another implementation may choose to only determine the geographical locations corresponding to the IP addresses within a city. Yet another implementation may choose to determine geographical locations of different precisions for the IP addresses depending on various factors, such as the records available and the behavior profiles to be constructed.
  • Sometimes, it is also possible for multiple IP addresses to be mapped to the same geographical location, if they are physically located nearby. For example, one city may have multiple ISPs, each having a different IP address. If a person interacts with the Internet through more than one ISP located in the same city, the network activity records may show different IP addresses mapped to the same city.
  • The determined geographical locations are associated with their corresponding IP addresses and may be stored along with the records. In Table 1, three different IP addresses, 216.109.112.135, 209.73.168.74, and 124.83.139.192, are shown in the records. Two of the IP addresses, 216.109.112.135 and 209.73.168.74, are matched to the same city: United States, California, Sunnyvale, while the third IP address, 124.83.139.192, is located in Japan. The following table, Table 2, shows the records of Table 1 with corresponding geographical locations determined based on the IP addresses. In this example, the geographical locations for each IP address are determined to the most granular level. Thus, for the two IP addresses located in the United States, the corresponding geographical locations are matched to within the city, and for the IP address located in Japan, the corresponding geographical location is matched only to within the country.
  • TABLE 2
    Sample Network Activity Records with Geographical Locations
    Activity Geographical
    Source ID IP Address Timestamp Locations
    61867037 216.109.112.135 2007-01-05 10:43:20 United States;
    California;
    Sunnyvale
    61867037 216.109.112.135 2007-01-12 18:51:12 United States;
    California;
    Sunnyvale
    61867037 209.73.168.74 2007-01-31 16:15:25 United States;
    California;
    Sunnyvale
    61867037 124.83.139.192 2007-02-10 23:54:14 Japan
    61867037 124.83.139.192 2007-02-17 12:42:21 Japan
    61867037 216.109.112.135 2007-02-21 09:04:14 United States;
    California;
    Sunnyvale
    61867037 209.73.168.74 2007-03-03 09:52:31 United States;
    California;
    Sunnyvale
    61867037 216.109.112.135 2007-03-17 14:20:30 United States;
    California;
    Sunnyvale
    61867037 124.83.139.192 2007-03-28 08:35:40 Japan
  • Once the geographical locations corresponding to the IP addresses are determined, at 130, one or more profiles for the activity source may be constructed using the network activity records and the geographical locations corresponding to the IP addresses in the records. The profiles describe or represent time-based behavior patterns with respect to the different geographical locations and may include information such as the geographical locations and timestamps indicating the time for the network activities conducted at each of the geographical locations. The profiles may cover different time periods, such as network activities conducted within a day, a week, a month, a year, and any other desirable time periods. Generally, in order to construct a profile covering a specific time period, network activity records should be available covering that time period.
  • For example, at 140, one or more daily profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each different location during a day. At 150, one or more weekly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a week. At 160, one or more monthly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per day during a month. At 170, one or more yearly profiles may optionally be constructed, each showing a percentage distribution of the amount of time during which there are network activities originated from each location per month during a year. Examples of daily, weekly, monthly, and yearly profiles are explained in more detail below in FIGS. 3-6 respectively.
  • Based on various types of profiles, at 180, future behaviors for the activity source may be predicted with respect to the geographical locations. For example, based on a daily profile representing network activities during a work day, future behaviors may be predicted for other work days. A similar concept applies to weekly, monthly, and yearly profiles. At 190, appropriate information may be provided to the activity source at the suitable geographical locations during the suitable time periods based on the predicted or expected future behaviors. The appropriateness of the information may depend on the types of predicted future behaviors considered. Again, examples of 180 and 190 will be explained in more detail below in FIGS. 3-6 with respect to the daily, weekly, monthly, and yearly profiles.
  • Different types of profiles (e.g., daily, weekly, monthly, and yearly) may be constructed based on a collection of network activity records covering the appropriate time periods. FIG. 2 is a diagram that illustrates relationships between the network activity records and profiles. To simplify the discussion, only five network activity records 200 are shown in FIG. 2. In practice, it is more likely that hundreds, even thousands of network activity records for a single activity source may be used to construct the profiles for that activity source.
  • Each network activity record 200 includes at least an indication, such as a unique ID, identifying the activity source, an IP address from where the activity originates, and a timestamp indicating the time of the activity. Of course, other information may also exist in the records. One or more geographical locations 210, perhaps at different levels of precision or granularity, are determined for each IP address and associated with the corresponding record 200. And one or more types of profiles (i.e., daily profile 220, weekly profile 221, monthly profile 222, and/or yearly profile 223) may be constructed based on the records 200 and the corresponding geographical locations 210. Depending on implementation requirements, for example, the same type of profiles 220, 221, 222, 223 may be constructed multiple times, each for a different time period. For example, two daily profiles 220 may be constructed, one representing a weekday and one representing a weekend day. Similarly, twelve monthly profiles 222 may be constructed, each representing a different month of the year.
  • Information from one or more records may be used to construct the profiles. In other words, information from all the available records is not necessarily always used to generate each profile. Sometimes, for a particular profile, such as a daily profile, only a few records are used. Other times, more records are used, such as for constructing a monthly or yearly profile.
  • FIGS. 3A and 3B are two graphical illustrations of sample daily profiles. FIG. 3A shows a sample weekday profile, and FIG. 3B shows a sample weekend day profile. Since people are unlikely to be interacting with the Internet all day long, the daily profiles would only show those time periods when the activity source is actually accessing the Internet.
  • In FIG. 3A, there are five distinct time periods during which the activity source is accessing the Internet: from 07:00 to 07:30, from 08:00 to 12:00, from 13:00 to 18:00, from 19:00 to 19:30, and finally from 21:00 to 22:00. Based on the geographical locations determined using the IP addresses in the network activity records, there are three distinct geographical locations from where the network activities originate. From 07:00 to 07:30 and from 21:00 to 22:00, the activities originate from geographical location 300. From 08:00 to 12:00 and from 13:00 to 18:00, the activities originate from geographical location 301. And from 19:00 to 19:30, the activities originate from geographical location 302.
  • Assuming the activity source ID is a user account-unique cookie, which generally implies that the network activity records represent a person logging into his or her user account, and since this is a profile for a weekday, the pattern of the network activities may indicate that geographical location 300 may be the person's home, geographical location 301 may be the person's office, and geographical location 302 may be a place where the person goes to after work, such as a restaurant, a coffee shop, a theatre, or a club. Based on the time periods during which there are network activities at each of the distinct geographical locations 300, 301, 302, a percentage distribution of the amount of time during which there are network activities originated from each location during the weekday may be calculated.
  • Consequently, a time-based behavior pattern may be determined with respect to the distinct geographical locations. In other words, a geographical location may be associated with each period of time when there are network activities. For example, as shown in FIG. 3A, the behavior pattern may indicate that the person leaves home for work around 07:30, spends the majority of the day (i.e., from approximately 8:00 to approximate 18:00) at the office, spends some time out during the evening, and arrives home no later than 21:00.
  • Of course, there are time periods during the day when there is no network activity from the person, and so no geographical locations are associated with those time periods. For example, early in the morning and late at night, there is no network activity and so no geographical locations are associated with those time periods, most likely because the person is asleep. Similarly, from 12:00 to 13:00 (i.e., the lunch hour) there is no corresponding geographical location, because there is no network activity from the person, perhaps because the person is having lunch.
  • Based on the daily profile shown in FIG. 3A, future behaviors for activity source during a weekday may be predicted. For example, a person is likely to spend approximately the same period of time at work during each weekday. Similarly, the person is likely to leave home for work and return home at approximately the same time each weekday. It is also possible that the person may frequent a few favorite establishments from time to time (e.g., having dinners at a favorite restaurant or buying grocery from the local grocery store).
  • Appropriate information corresponding to the person's daily activities may be provided to the person conducting the network activities based on the predicted or expected future behaviors. For example, assuming geographical location 302 is a night club, information may be provided to the person earlier in the afternoon or shortly before the person leaves work about the events that will likely take place at the night club (i.e., geographical location 302) later that evening. Or, if geographical location 302 is a grocery store, information about the special offers at the store may be sent to the person either shortly before the person is likely or expected to go to the store or while the person is likely at the store. If the locations of the person's home and office are known, the route the person takes to and from work may be determined. During early morning and late afternoon on weekdays, traffic information about the route may be provided. Other information relating to daily activities may include weather, news, etc.
  • There are many ways to send information to a person via the Internet. For example, information may be sent via email, instant message, voice message, etc.
  • In FIG. 3B, there are three distinct time periods during which the activity source is accessing the Internet: from 08:00 to 11:30, from 15:30 to 16:00, and from 19:00 to 20:00. Again, based on the geographical locations determined using the IP addresses in the network activity records, there are two distinct geographical locations from where the network activities originate. From 08:00 to 11:30 and 19:00 to 20:00, the activities originate from geographical location 300. From 15:30 to 16:00, the activities originate from geographical location 303.
  • Consequently, the time-based behavior pattern determined from the profile shown in FIG. 3B may indicate that on a weekend day, the person spends the morning at home, goes out in the afternoon, and spends at least some time during the evening again at home. In addition, while a person is having fun, he or she may not access the Internet for long periods of time. The person may only quickly check his or her emails from time to time. Thus, although in FIG. 3B, there are network activities originated from geographical location 303 for approximately half an hour (from 15:30 to 16:00), the person may actually be at geographical location 303 for a much longer time period.
  • Often, a person's behavior may not be as regular on the weekends as during the week. Nevertheless, it is still possible to predict the person's future behavior pattern, especially if multiple weekend day profiles are used. For example, several weekend day profiles may be constructed, each representing a different weekend day, and future weekend day behaviors may be predicted based on multiple weekend day profiles, perhaps by aggregating or averaging the information from these multiple profiles in order to obtain a more precise behavior pattern.
  • Thus, several weekend day profiles may together indicate that the person usually goes out in the afternoons on the weekends. Of course, the person may not always visit the same place on every weekend. On some days, the person may visit one place while on other days, the person visit another place. Based on the number of times the person visits each place, it may be determined that the person may visit some places more frequently than others. It may also be determined that the person may always visit a particular place on certain weekend days (e.g., every first Saturday of the month).
  • The daily profiles show time-based behavior pattern for an activity source during a single day. A weekly profile, on the other hand, shows time-based behavior pattern for an activity source for each day of the week during an entire week. FIG. 4 is a graphical illustration of a sample weekly profile. Time-based distributions for the network activities originated from each of the distinct geographical locations are described for each day of the week. From the sample weekly profile shown in FIG. 4, there appears to be more network activities during the week than on the weekend, perhaps due to the fact that the person often spends time on other activities on the weekends.
  • During weekdays, the person spends a majority of time at work (i.e., geographical location 301). The person may occasionally go out on weekday evenings. However, on the weekends, the person may visit places for leisure or entertainment more frequently (e.g., geographical locations 302 and 303). Again, future behavior patterns describing the activity source's weekly activities may be predicted using one or more weekly profiles, and information about the person's weekly activities, such as leisure time activities, may be provided to the person based on the predicted or expected future activities.
  • For example, information about places that the person likes to visit on the weekends may be provided to the person, perhaps on each Friday. If the person frequently goes to a movie theatre on the weekends, information about movies that will be played at the theatre during the upcoming weekend may be sent to the person some time during the week. If the person likes to shop at a mall on the weekends, information about special offers or advertisement from the stores at the mall may be sent to the person at the appropriate time (e.g., either shortly before or while the person is shopping).
  • Similar to daily profiles, more than one weekly profile may be constructed for an activity source. These multiple weekly profiles may represent different weeks of a month, or weeks of multiple months.
  • To further extend the period of time covered in a profile, FIG. 5 is a graphical illustration of a sample monthly profile. In this case, time distributions for network activities originated from each distinct geographical location are described for each day of the month for an entire month, which in turn shows the behavior pattern of the network activity source during the month.
  • In the sample profile shown in FIG. 5, during the first, second, and fourth week of the month, the profile indicates that the activity source repeats approximately the same behavior pattern: spending most of the weekdays at the office (geographical location 301), occasionally having some leisure time by visiting various establishments on weekday evenings or weekends (geographical locations 302 and 303), and spending other times at home (geographical location 300).
  • During the third week of month (from the 14th to the 20th), the profile indicates that the activity source is at a new geographical location 304. This may imply or indicate that the activity source travels to another site, such as a different office location of the company or a customer site, for business on the third week of the week. Thus, geographical location 304 may be the office of the business site the activity source visits, since the activity source is there during normal business hours. Geographical location 305 may be a hotel where the activity source stays during the week, and geographical location 306 may be an airport.
  • One or more monthly profiles, such as the one shown in FIG. 5, may be used to predict the activity source's future behavior pattern on a monthly basis. For example, the activity source may visit the alternative office site (geographical location 304) to take other business trips periodically, such as once a month or once every few months. Information relating to monthly activities shown in the monthly profile may be provided to the activity source. For example, if based on the monthly profile, it may be predicted that the activity source will take a business trip soon, travel information, such as flights, hotels, restaurants, etc. may be sent to the activity source some time before the scheduled time for the trip.
  • Similar to daily and weekly profiles, more than one monthly profile may be constructed for an activity source. These multiple monthly profiles may represent different months of a year, or months of different years.
  • FIG. 6 is a graphical illustration of a sample yearly profile. Time distributions for network activities originated from each distinct geographical location are described for each month of the year for an entire year, which in turn shows the behavior pattern of the network activity source during the year. In the sample profile shown in FIG. 6, the activity source normally spends most of the time between home (geographical location 300) and office (geographical location 301). Once every three months, the activity source generally visits an alternative office site (geographical location 304) for a week and stays at a hotel (geographical location 305) during the visit.
  • During the first two weeks of August, the activity source visits another new geographical location 307. It may be determined that geographical location 307 is a place the activity source visits during vacation time, such as a beach resort or a city in a different country. Similarly, during the last week of December, the activity source also visits a new geographical location 308, which may be a ski resort or a home of a friend of family whom the activity source visits during the holiday season.
  • Again, the yearly profile may be used to predict future behaviors for the activity source on a yearly basis. Information relating to the activity source's yearly activities may be provided to the activity source at appropriate times. For example, when it gets close to the time when the activity source is expected to take a vacation, tourism related information, such as resorts, possible destinations, flights, hotels, services, etc. may be provided to the activity source. When it gets close to the holiday seasons, information on merchandise as possible gift ideas as well as travel information may be provided to the activity source.
  • Again, if desirable, multiple yearly profiles, similar to that shown in FIG. 6, may be constructed for an activity source.
  • The method described above in FIG. 1 may be carried out, for example, in a programmed computing system. FIG. 7 is a simplified diagram of a network environment in which specific embodiments of the present invention may be implemented. The various aspects of the invention may be practiced in a wide variety of network environments (represented by network 217) including, for example, TCP/IP-based networks, telecommunications networks, wireless networks, etc. In addition, the computer program instructions with which embodiments of the invention are implemented may be stored in any type of computer-readable media, and may be executed according to a variety of computing models including, for example, on a stand-alone computing device, or according to a distributed computing model in which various of the functionalities described herein may be effected or employed at different locations. The software program implementing various embodiments may be executed on the server 208. For example, websites may be hosted on various servers 708. Software programs designed to collect network activity information (e.g., activity source ID, IP address, timestamp) may be executed on the servers 708 as well. The collected information may be stored in one or more databases 714 communicatively linked to the servers 708
  • According to various embodiments, interaction with the Internet 712 may be conducted using various devices, such as desktop computers 703, notebook computers 702, mobile telephones 704, PDAs 705, etc. The devices may be connected to the Internet via cables and perhaps through a router 709 or wirelessly. A web browser may be executed on the devices and used to view the web page, each web browser having a unique ID that may be used to identify the web browser (i.e., activity source).
  • While this invention has been described in terms of several preferred embodiments, there are alterations, permutations, and various substitute equivalents, which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, permutations, and various substitute equivalents as fall within the true spirit and scope of the present invention.

Claims (24)

1. A computer-implemented method for constructing network activity profiles, comprising:
obtaining a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction;
for each record, determining a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and
constructing at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
2. The computer-implemented method, as recited in claim 1, further comprising:
predicting future behaviors of the activity source based on the at least one profile.
3. The computer-implemented method, as recited in claim 1, wherein the time-based behavior pattern associated with the at least one geographical location represents a time distribution for network activities originated from each of the at least one geographical location during a predetermined period of time.
4. The computer-implemented method, as recited in claim 1, wherein the at least one profile comprises a daily profile comprising a time distribution for network behaviors originated from each of the at least one geographical location during a day.
5. The computer-implemented method, as recited in claim 4, wherein the predicting future behaviors of the activity source based on the at least one profile comprises predicting future daily behaviors of the activity source associated with each of the at least one geographical location based on the daily profile.
6. The computer-implemented method, as recited in claim 1, wherein the at least one profile comprises a weekly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each day of a week during the week.
7. The computer-implemented method, as recited in claim 6, wherein the predicting future behaviors of the activity source based on the at least one profile comprises predicting future weekly behaviors of the activity source associated with each of the at least one geographical location based on the weekly profile.
8. The computer-implemented method, as recited in claim 1, wherein the at least one profile comprises a monthly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each day of a month during the month.
9. The computer-implemented method, as recited in claim 8, wherein the predicting future behaviors of the activity source based on the at least one profile comprises predicting future monthly behaviors of the activity source associated with each of the at least one geographical location based on the monthly profile.
10. The computer-implemented method, as recited in claim 1, wherein the at least one profile comprises a yearly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each month of a year during the year.
11. The computer-implemented method, as recited in claim 10, wherein the predicting future behaviors of the activity source based on the at least one profile comprises predicting future yearly behaviors of the activity source associated with each of the at least one geographical location based on the yearly profile.
12. The computer-implemented method, as recited in claim 1, wherein the activity source is one selected from the group consisting of web browser, and user account.
13. The computer-implemented method, as recited in claim 1, wherein the geographical location is one selected from the group consisting of country, state, province, county, city, most granular location, or direct market area.
14. The computer-implemented method, as recited in claim 1, wherein the network endpoint address is an IP (Internet Protocol) address and the indication of the time is a timestamp.
15. A computer-implemented method for predicting future behaviors, comprising:
constructing at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein
each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and
each profile comprises a time-based behavior pattern associated with the at least one geographical location; and
predicting future behaviors of the activity source based on the at least one profile.
16. The computer-implemented method, as recited in claim 15, wherein the predicting future behaviors of the activity source based on the at least one profile comprises predicting future behaviors expected to originate from each of the at least one geographical location based on the time-based behavior pattern associated with that geographical location.
17. The computer-implemented method, as recited in claim 16, further comprising:
providing information associated with each of the at least one geographical location based on the predicted future behaviors expected to originate from that geographical location.
18. The computer-implemented method, as recited in claim 17, wherein the providing information associated with each of the at least one geographical location based on the predicted future behaviors expected to originate from that geographical location comprises for each of the at least one geographical location, providing information based on that geographical location and the predicted future behaviors associated with that geographical location for a time when the predicted future behaviors are expected to originate from that geographical location.
19. The computer-implemented method, as recited in claim 17, wherein the information is at least one selected from the group consisting of advertisement, merchandise offers, service offers, weather information, news, and travel information.
20. The computer-implemented method, as recited in claim 15, wherein the at least one profile comprises
a daily profile comprising a time distribution for network activities originated from each of the at least one geographical location during a day,
a weekly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each day of a week during the week,
a monthly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each day of a month during the month, and
a yearly profile comprising a time distribution for network activities originated from each of the at least one geographical location for each month of a year during the year.
21. The computer-implemented method, as recited in claim 20, wherein the predicting future behaviors of the activity source based on the at least one profile comprises
predicting future daily behaviors of the activity source associated with each of the at least one geographical location based on the daily profile,
predicting future weekly behaviors of the activity source associated with each of the at least one geographical location based on the weekly profile,
predicting future monthly behaviors of the activity source associated with each of the at least one geographical location based on the monthly profile, and
predicting future yearly behaviors of the activity source associated with each of the at least one geographical location based on the yearly profile.
22. The computer-implemented method, as recited in claim 20, further comprising:
providing daily information associated with each of the at least one geographical location based on the predicted daily behaviors expected to originate from that geographical location;
providing weekly information associated with each of the at least one geographical location based on the predicted weekly behaviors expected to originate from that geographical location;
providing monthly information associated with each of the at least one geographical location based on the predicted monthly behaviors expected to originate from that geographical location; and
providing yearly information associated with each of the at least one geographical location based on the predicted yearly behaviors expected to originate from that geographical location.
23. A computer program product for constructing network activity profiles comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to:
obtain a plurality of records of network activities from an activity source, each record corresponding to an interaction with a network resource via the network from the activity source, wherein each record comprises at least a network endpoint address from where the interaction originates and an indication of a time of the interaction;
for each record, determine a geographical location corresponding to the network endpoint address of that record and associating the determined geographical location with that record; and
construct at least one profile for the activity source based on the plurality of records and at least one geographical location associated with the records, wherein each profile comprises a time-based behavior pattern associated with the at least one geographical location.
24. A computer program product predicting future behaviors comprising a computer-readable medium having a plurality of computer program instructions stored therein, which are operable to cause at least one computing device to:
construct at least one profile for an activity source based on a plurality of records of network activities from the activity source and at least one geographical location associated with the records, wherein
each record corresponds to an interaction with a network resource via the network originated from one of the at least one geographical location from the activity source, and
each profile comprises a time-based behavior pattern associated with the at least one geographical location; and
predict future behaviors of the activity source based on the at least one profile.
US11/776,488 2007-07-11 2007-07-11 Behavioral predictions based on network activity locations Expired - Fee Related US7958228B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US11/776,488 US7958228B2 (en) 2007-07-11 2007-07-11 Behavioral predictions based on network activity locations
PCT/US2008/067902 WO2009009284A2 (en) 2007-07-11 2008-06-23 Behavioral predictions based on network activity locations
TW097124691A TWI369617B (en) 2007-07-11 2008-07-01 Behavioral predictions based on network activity locations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/776,488 US7958228B2 (en) 2007-07-11 2007-07-11 Behavioral predictions based on network activity locations

Publications (2)

Publication Number Publication Date
US20090019182A1 true US20090019182A1 (en) 2009-01-15
US7958228B2 US7958228B2 (en) 2011-06-07

Family

ID=40229402

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/776,488 Expired - Fee Related US7958228B2 (en) 2007-07-11 2007-07-11 Behavioral predictions based on network activity locations

Country Status (3)

Country Link
US (1) US7958228B2 (en)
TW (1) TWI369617B (en)
WO (1) WO2009009284A2 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100151816A1 (en) * 2008-12-16 2010-06-17 Jan Besehanic Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20110016058A1 (en) * 2009-07-14 2011-01-20 Pinchuk Steven G Method of predicting a plurality of behavioral events and method of displaying information
US20140045596A1 (en) * 2012-08-07 2014-02-13 Lawrence Cameron Vaughan Methods and systems for determining the location of online gaming clients
US20140156841A1 (en) * 2010-07-27 2014-06-05 Aerohive Networks, Inc. Client-independent network supervision application
US20140237105A1 (en) * 2013-02-15 2014-08-21 Aude Hofleitner Estimation of user location based upon access patterns
US8954090B2 (en) 2010-08-25 2015-02-10 The Nielson Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US20160036646A1 (en) * 2013-04-10 2016-02-04 Tencent Technology (Shenzhen) Company Limited Method and apparatus for determining area in which ip address is located
WO2016051925A1 (en) * 2014-09-29 2016-04-07 シャープ株式会社 Weekday/holiday determining device, weekday/holiday determining method, and program
US9449279B2 (en) 2010-06-24 2016-09-20 The Nielsen Company (Us), Llc Network server arrangements for processing non-parametric, multi-dimensional, spatial and temporal human behavior or technical observations measured pervasively, and related methods for the same
US9479540B2 (en) 2013-12-13 2016-10-25 Aerohive Networks, Inc. User-based network onboarding
US9633190B2 (en) 2008-04-01 2017-04-25 Nudata Security Inc. Systems and methods for assessing security risk
US9648034B2 (en) 2015-09-05 2017-05-09 Nudata Security Inc. Systems and methods for detecting and scoring anomalies
US9690676B2 (en) 2013-03-15 2017-06-27 Aerohive Networks, Inc. Assigning network device subnets to perform network activities using network device information
US9842204B2 (en) 2008-04-01 2017-12-12 Nudata Security Inc. Systems and methods for assessing security risk
US9948626B2 (en) 2013-03-15 2018-04-17 Aerohive Networks, Inc. Split authentication network systems and methods
US9990487B1 (en) 2017-05-05 2018-06-05 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US10007776B1 (en) 2017-05-05 2018-06-26 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US10127373B1 (en) 2017-05-05 2018-11-13 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US20190066126A1 (en) * 2008-05-27 2019-02-28 Qualcomm Incorporated Methods and apparatus for generating user profile based on periodic location fixes
TWI681306B (en) * 2017-10-10 2020-01-01 英華達股份有限公司 Method, system and storage media for group notification based on user behavior
US10860984B1 (en) 2019-06-18 2020-12-08 Microsoft Technology Licensing, Llc Out of office email detection system
US20220239674A1 (en) * 2016-11-28 2022-07-28 Palo Alto Networks, Inc. Security appliance to monitor networked computing environment
US11502914B2 (en) 2009-05-08 2022-11-15 The Nielsen Company (Us), Llc Systems and methods for behavioural and contextual data analytics

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7809805B2 (en) 2007-02-28 2010-10-05 Facebook, Inc. Systems and methods for automatically locating web-based social network members
US8375052B2 (en) * 2007-10-03 2013-02-12 Microsoft Corporation Outgoing message monitor
US8990106B2 (en) * 2008-08-22 2015-03-24 Realwire Limited Information categorisation systems, modules, and methods
US9119027B2 (en) * 2009-10-06 2015-08-25 Facebook, Inc. Sharing of location-based content item in social networking service
US8452779B1 (en) 2010-07-09 2013-05-28 Collective Labs, Llc Methods and system for targeted content delivery
US8412665B2 (en) 2010-11-17 2013-04-02 Microsoft Corporation Action prediction and identification temporal user behavior
US10304066B2 (en) 2010-12-22 2019-05-28 Facebook, Inc. Providing relevant notifications for a user based on location and social information
US8838581B2 (en) * 2011-08-19 2014-09-16 Facebook, Inc. Sending notifications about other users with whom a user is likely to interact
US20130297536A1 (en) 2012-05-01 2013-11-07 Bernie Almosni Mental health digital behavior monitoring support system and method
US9641544B1 (en) * 2015-09-18 2017-05-02 Palo Alto Networks, Inc. Automated insider threat prevention
US10855656B2 (en) 2017-09-15 2020-12-01 Palo Alto Networks, Inc. Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
US10931637B2 (en) 2017-09-15 2021-02-23 Palo Alto Networks, Inc. Outbound/inbound lateral traffic punting based on process risk
US11127014B2 (en) 2017-12-11 2021-09-21 Mastercard International Incorporated Systems and methods for analyzing sleep data and sleep pattern data

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5835087A (en) * 1994-11-29 1998-11-10 Herz; Frederick S. M. System for generation of object profiles for a system for customized electronic identification of desirable objects
US20010013123A1 (en) * 1991-11-25 2001-08-09 Freeman Michael J. Customized program creation by splicing server based video, audio, or graphical segments
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
US20020016786A1 (en) * 1999-05-05 2002-02-07 Pitkow James B. System and method for searching and recommending objects from a categorically organized information repository
US20020073419A1 (en) * 2000-11-28 2002-06-13 Navic Systems, Incorporated Using viewership Profiles for targeted promotion deployment
US20020111172A1 (en) * 2001-02-14 2002-08-15 Dewolf Frederik M. Location based profiling
US20020184080A1 (en) * 1999-04-20 2002-12-05 Uzi Murad Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud
US20020188507A1 (en) * 2001-06-12 2002-12-12 International Business Machines Corporation Method and system for predicting customer behavior based on data network geography
US20030083938A1 (en) * 2001-10-29 2003-05-01 Ncr Corporation System and method for profiling different users having a common computer identifier
US20030195694A1 (en) * 2001-06-06 2003-10-16 Frank Kozak Driving profile method and system
US6654735B1 (en) * 1999-01-08 2003-11-25 International Business Machines Corporation Outbound information analysis for generating user interest profiles and improving user productivity
US20040068582A1 (en) * 2000-04-03 2004-04-08 Mark Anderson Method and system to initiate geolocation activities on demand and responsive to receipt of a query
US20050197954A1 (en) * 2003-08-22 2005-09-08 Jill Maitland Methods and systems for predicting business behavior from profiling consumer card transactions
US20060212601A1 (en) * 2001-03-19 2006-09-21 Microsoft Corporation Method and system to determine the geographic location of a network user
US20070021973A1 (en) * 2005-07-25 2007-01-25 Newdea, Inc. Automated community to exchange philanthropy information
US20070206741A1 (en) * 2006-03-01 2007-09-06 Sbc Knowledge Ventures Lp Method and apparatus for monitoring network activity
US20070250628A1 (en) * 2004-11-26 2007-10-25 Fujitsu Limited Network/service control method
US20080015878A1 (en) * 2006-07-17 2008-01-17 Yahoo! Inc. Real-time user profile platform for targeted online advertisement and personalization
US20080086473A1 (en) * 2006-10-06 2008-04-10 Prodigen, Llc Computerized management of grouping access rights
US20080133311A1 (en) * 2006-12-01 2008-06-05 Rodrigo Dario Madriz Ottolina System and method for managing content consumption using a content licensing platform
US20080181179A1 (en) * 2007-01-31 2008-07-31 Jeyhan Karaoguz Anticipatory hand-off setup between networks
US20090132345A1 (en) * 2004-02-13 2009-05-21 Bahram Meyssami Method and system for determining relevant matches based on attributes
US20090150238A1 (en) * 2005-10-12 2009-06-11 Adam Marsh System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements
US7617160B1 (en) * 2003-02-05 2009-11-10 Michael I. Grove Choice-based relationship system (CRS)
US20100151817A1 (en) * 2007-02-26 2010-06-17 Lidstroem Mattias Method And Apparatus For Monitoring Client Behaviour

Patent Citations (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010013123A1 (en) * 1991-11-25 2001-08-09 Freeman Michael J. Customized program creation by splicing server based video, audio, or graphical segments
US5835087A (en) * 1994-11-29 1998-11-10 Herz; Frederick S. M. System for generation of object profiles for a system for customized electronic identification of desirable objects
US6654735B1 (en) * 1999-01-08 2003-11-25 International Business Machines Corporation Outbound information analysis for generating user interest profiles and improving user productivity
US20020184080A1 (en) * 1999-04-20 2002-12-05 Uzi Murad Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud
US20020016786A1 (en) * 1999-05-05 2002-02-07 Pitkow James B. System and method for searching and recommending objects from a categorically organized information repository
US7031961B2 (en) * 1999-05-05 2006-04-18 Google, Inc. System and method for searching and recommending objects from a categorically organized information repository
US20010036224A1 (en) * 2000-02-07 2001-11-01 Aaron Demello System and method for the delivery of targeted data over wireless networks
US20040068582A1 (en) * 2000-04-03 2004-04-08 Mark Anderson Method and system to initiate geolocation activities on demand and responsive to receipt of a query
US20020073419A1 (en) * 2000-11-28 2002-06-13 Navic Systems, Incorporated Using viewership Profiles for targeted promotion deployment
US20020111172A1 (en) * 2001-02-14 2002-08-15 Dewolf Frederik M. Location based profiling
US20060212601A1 (en) * 2001-03-19 2006-09-21 Microsoft Corporation Method and system to determine the geographic location of a network user
US20030195694A1 (en) * 2001-06-06 2003-10-16 Frank Kozak Driving profile method and system
US20020188507A1 (en) * 2001-06-12 2002-12-12 International Business Machines Corporation Method and system for predicting customer behavior based on data network geography
US20030083938A1 (en) * 2001-10-29 2003-05-01 Ncr Corporation System and method for profiling different users having a common computer identifier
US7617160B1 (en) * 2003-02-05 2009-11-10 Michael I. Grove Choice-based relationship system (CRS)
US20050197954A1 (en) * 2003-08-22 2005-09-08 Jill Maitland Methods and systems for predicting business behavior from profiling consumer card transactions
US7853469B2 (en) * 2003-08-22 2010-12-14 Mastercard International Methods and systems for predicting business behavior from profiling consumer card transactions
US20090132345A1 (en) * 2004-02-13 2009-05-21 Bahram Meyssami Method and system for determining relevant matches based on attributes
US20070250628A1 (en) * 2004-11-26 2007-10-25 Fujitsu Limited Network/service control method
US20070021973A1 (en) * 2005-07-25 2007-01-25 Newdea, Inc. Automated community to exchange philanthropy information
US20090150238A1 (en) * 2005-10-12 2009-06-11 Adam Marsh System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements
US20070206741A1 (en) * 2006-03-01 2007-09-06 Sbc Knowledge Ventures Lp Method and apparatus for monitoring network activity
US20080015878A1 (en) * 2006-07-17 2008-01-17 Yahoo! Inc. Real-time user profile platform for targeted online advertisement and personalization
US20080086473A1 (en) * 2006-10-06 2008-04-10 Prodigen, Llc Computerized management of grouping access rights
US20080133311A1 (en) * 2006-12-01 2008-06-05 Rodrigo Dario Madriz Ottolina System and method for managing content consumption using a content licensing platform
US20080181179A1 (en) * 2007-01-31 2008-07-31 Jeyhan Karaoguz Anticipatory hand-off setup between networks
US20100151817A1 (en) * 2007-02-26 2010-06-17 Lidstroem Mattias Method And Apparatus For Monitoring Client Behaviour

Cited By (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10997284B2 (en) 2008-04-01 2021-05-04 Mastercard Technologies Canada ULC Systems and methods for assessing security risk
US9842204B2 (en) 2008-04-01 2017-12-12 Nudata Security Inc. Systems and methods for assessing security risk
US11036847B2 (en) 2008-04-01 2021-06-15 Mastercard Technologies Canada ULC Systems and methods for assessing security risk
US9946864B2 (en) 2008-04-01 2018-04-17 Nudata Security Inc. Systems and methods for implementing and tracking identification tests
US10839065B2 (en) 2008-04-01 2020-11-17 Mastercard Technologies Canada ULC Systems and methods for assessing security risk
US9633190B2 (en) 2008-04-01 2017-04-25 Nudata Security Inc. Systems and methods for assessing security risk
US20190066126A1 (en) * 2008-05-27 2019-02-28 Qualcomm Incorporated Methods and apparatus for generating user profile based on periodic location fixes
US11341511B2 (en) * 2008-05-27 2022-05-24 Qualcomm Incorporated Methods and apparatus for generating user profile based on periodic location fixes
US20220237631A1 (en) * 2008-05-27 2022-07-28 Qualcomm Incorporated Methods and apparatus for generating user profile based on periodic location fixes
US20140358640A1 (en) * 2008-12-16 2014-12-04 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US10956923B2 (en) * 2008-12-16 2021-03-23 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20190095938A1 (en) * 2008-12-16 2019-03-28 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20230177546A1 (en) * 2008-12-16 2023-06-08 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US10078846B2 (en) * 2008-12-16 2018-09-18 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US11783356B2 (en) * 2008-12-16 2023-10-10 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US11556946B2 (en) * 2008-12-16 2023-01-17 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20210295360A1 (en) * 2008-12-16 2021-09-23 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US20100151816A1 (en) * 2008-12-16 2010-06-17 Jan Besehanic Methods and apparatus for associating media devices with a demographic composition of a geographic area
US8812012B2 (en) * 2008-12-16 2014-08-19 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US10685365B2 (en) * 2008-12-16 2020-06-16 The Nielsen Company (Us), Llc Methods and apparatus for associating media devices with a demographic composition of a geographic area
US11502914B2 (en) 2009-05-08 2022-11-15 The Nielsen Company (Us), Llc Systems and methods for behavioural and contextual data analytics
US20110016058A1 (en) * 2009-07-14 2011-01-20 Pinchuk Steven G Method of predicting a plurality of behavioral events and method of displaying information
US9449279B2 (en) 2010-06-24 2016-09-20 The Nielsen Company (Us), Llc Network server arrangements for processing non-parametric, multi-dimensional, spatial and temporal human behavior or technical observations measured pervasively, and related methods for the same
US9699055B2 (en) * 2010-07-27 2017-07-04 Aerohive Networks, Inc. Client-independent network supervision application
US9282018B2 (en) * 2010-07-27 2016-03-08 Aerohive Networks, Inc. Client-independent network supervision application
US20140156841A1 (en) * 2010-07-27 2014-06-05 Aerohive Networks, Inc. Client-independent network supervision application
US11769174B2 (en) 2010-08-25 2023-09-26 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US9613363B2 (en) 2010-08-25 2017-04-04 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US10380643B2 (en) 2010-08-25 2019-08-13 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US11170410B2 (en) 2010-08-25 2021-11-09 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US8954090B2 (en) 2010-08-25 2015-02-10 The Nielson Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US10713687B2 (en) 2010-08-25 2020-07-14 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US9996855B2 (en) 2010-08-25 2018-06-12 The Nielsen Company (Us), Llc Methods, systems and apparatus to generate market segmentation data with anonymous location data
US20140045596A1 (en) * 2012-08-07 2014-02-13 Lawrence Cameron Vaughan Methods and systems for determining the location of online gaming clients
US9787781B2 (en) * 2013-02-15 2017-10-10 Facebook, Inc. Estimation of user location based upon access patterns
US20140237105A1 (en) * 2013-02-15 2014-08-21 Aude Hofleitner Estimation of user location based upon access patterns
US9690676B2 (en) 2013-03-15 2017-06-27 Aerohive Networks, Inc. Assigning network device subnets to perform network activities using network device information
US10810095B2 (en) 2013-03-15 2020-10-20 Extreme Networks, Inc. Assigning network device subnets to perform network activities using network device information
US10924465B2 (en) 2013-03-15 2021-02-16 Extreme Networks, Inc. Split authentication network systems and methods
US9965366B2 (en) 2013-03-15 2018-05-08 Aerohive Networks, Inc. Assigning network device subnets to perform network activities using network device information
US10397211B2 (en) 2013-03-15 2019-08-27 Aerohive Networks, Inc. Split authentication network systems and methods
US9948626B2 (en) 2013-03-15 2018-04-17 Aerohive Networks, Inc. Split authentication network systems and methods
US10097420B2 (en) * 2013-04-10 2018-10-09 Tencent Technology (Shenzhen) Company Limited Method and apparatus for determining area in which IP address is located
US20160036646A1 (en) * 2013-04-10 2016-02-04 Tencent Technology (Shenzhen) Company Limited Method and apparatus for determining area in which ip address is located
US10003615B2 (en) 2013-12-13 2018-06-19 Aerohive Networks, Inc. User-based network onboarding
US10320847B2 (en) 2013-12-13 2019-06-11 Aerohive Networks, Inc. User-based network onboarding
US9479540B2 (en) 2013-12-13 2016-10-25 Aerohive Networks, Inc. User-based network onboarding
US9686319B2 (en) 2013-12-13 2017-06-20 Aerohive Networks, Inc. User-based network onboarding
WO2016051925A1 (en) * 2014-09-29 2016-04-07 シャープ株式会社 Weekday/holiday determining device, weekday/holiday determining method, and program
JPWO2016051925A1 (en) * 2014-09-29 2017-04-27 シャープ株式会社 Weekday holiday determination device, weekday holiday determination method, and program
US9813446B2 (en) * 2015-09-05 2017-11-07 Nudata Security Inc. Systems and methods for matching and scoring sameness
US9749356B2 (en) 2015-09-05 2017-08-29 Nudata Security Inc. Systems and methods for detecting and scoring anomalies
US10749884B2 (en) 2015-09-05 2020-08-18 Mastercard Technologies Canada ULC Systems and methods for detecting and preventing spoofing
CN108885659A (en) * 2015-09-05 2018-11-23 万事达卡技术加拿大无限责任公司 System and method for matching and scoring identity
US10129279B2 (en) 2015-09-05 2018-11-13 Mastercard Technologies Canada ULC Systems and methods for detecting and preventing spoofing
US9979747B2 (en) 2015-09-05 2018-05-22 Mastercard Technologies Canada ULC Systems and methods for detecting and preventing spoofing
AU2019271891B2 (en) * 2015-09-05 2021-02-18 Mastercard Technologies Canada ULC Systems and methods for matching and scoring sameness
US10212180B2 (en) 2015-09-05 2019-02-19 Mastercard Technologies Canada ULC Systems and methods for detecting and preventing spoofing
US10965695B2 (en) 2015-09-05 2021-03-30 Mastercard Technologies Canada ULC Systems and methods for matching and scoring sameness
US9800601B2 (en) 2015-09-05 2017-10-24 Nudata Security Inc. Systems and methods for detecting and scoring anomalies
US9749357B2 (en) * 2015-09-05 2017-08-29 Nudata Security Inc. Systems and methods for matching and scoring sameness
US10805328B2 (en) 2015-09-05 2020-10-13 Mastercard Technologies Canada ULC Systems and methods for detecting and scoring anomalies
US9749358B2 (en) 2015-09-05 2017-08-29 Nudata Security Inc. Systems and methods for matching and scoring sameness
US9648034B2 (en) 2015-09-05 2017-05-09 Nudata Security Inc. Systems and methods for detecting and scoring anomalies
US9680868B2 (en) 2015-09-05 2017-06-13 Nudata Security Inc. Systems and methods for matching and scoring sameness
US20220239674A1 (en) * 2016-11-28 2022-07-28 Palo Alto Networks, Inc. Security appliance to monitor networked computing environment
US11818144B2 (en) * 2016-11-28 2023-11-14 Palo Alto Networks, Inc. Security appliance to monitor networked computing environment
US10007776B1 (en) 2017-05-05 2018-06-26 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US10127373B1 (en) 2017-05-05 2018-11-13 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
US9990487B1 (en) 2017-05-05 2018-06-05 Mastercard Technologies Canada ULC Systems and methods for distinguishing among human users and software robots
TWI681306B (en) * 2017-10-10 2020-01-01 英華達股份有限公司 Method, system and storage media for group notification based on user behavior
US10860984B1 (en) 2019-06-18 2020-12-08 Microsoft Technology Licensing, Llc Out of office email detection system

Also Published As

Publication number Publication date
US7958228B2 (en) 2011-06-07
WO2009009284A2 (en) 2009-01-15
TW200915110A (en) 2009-04-01
WO2009009284A3 (en) 2009-04-02
TWI369617B (en) 2012-08-01

Similar Documents

Publication Publication Date Title
US7958228B2 (en) Behavioral predictions based on network activity locations
US12093339B1 (en) Methods and systems for providing a document
US20190158609A1 (en) System and method for improved mapping and routing
US10558724B2 (en) Location graph based derivation of attributes
US10304086B2 (en) Techniques for estimating demographic information
JP5771534B2 (en) System and method for delivering sponsored landmarks and location labels
JP4866463B2 (en) System and method for dynamically providing news distribution for users of social networks
US10304065B2 (en) Determining advertising conversion
US20170180505A1 (en) Method, computer-readable storage device and apparatus for storing privacy information
US20160027055A1 (en) Combining attributes from multiple sources
US20100198869A1 (en) System and method for communal search
US11961097B2 (en) Determining advertising conversion
JP2014510972A (en) Determining preference categories based on user access attribute values
CN101802856A (en) Measuring a location based advertising campaign
JP6693896B2 (en) Information processing apparatus, information processing method, and information processing program
JP2008181334A (en) Advertisement distribution order determination method, advertisement distribution system, advertisement distribution order determination device and computer program
US20130117127A1 (en) Contextual ad stories
US20130006727A1 (en) Systems and methods for social filtering of geobookmarks
US11575762B2 (en) Subscription-based message selection and transmission

Legal Events

Date Code Title Description
AS Assignment

Owner name: YAHOO! INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIISE, SOREN;PATEL, DEVESH;PAI, RAMESH G.;AND OTHERS;SIGNING DATES FROM 20070705 TO 20070710;REEL/FRAME:019544/0887

Owner name: YAHOO! INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RIISE, SOREN;PATEL, DEVESH;PAI, RAMESH G.;AND OTHERS;REEL/FRAME:019544/0887;SIGNING DATES FROM 20070705 TO 20070710

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: EXCALIBUR IP, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038383/0466

Effective date: 20160418

AS Assignment

Owner name: YAHOO! INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:038951/0295

Effective date: 20160531

AS Assignment

Owner name: EXCALIBUR IP, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:038950/0592

Effective date: 20160531

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:ACACIA RESEARCH GROUP LLC;AMERICAN VEHICULAR SCIENCES LLC;BONUTTI SKELETAL INNOVATIONS LLC;AND OTHERS;REEL/FRAME:052853/0153

Effective date: 20200604

AS Assignment

Owner name: R2 SOLUTIONS LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXCALIBUR IP, LLC;REEL/FRAME:053459/0059

Effective date: 20200428

AS Assignment

Owner name: BONUTTI SKELETAL INNOVATIONS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: R2 SOLUTIONS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: LIFEPORT SCIENCES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: TELECONFERENCE SYSTEMS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: STINGRAY IP SOLUTIONS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: INNOVATIVE DISPLAY TECHNOLOGIES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: LIMESTONE MEMORY SYSTEMS LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: UNIFICATION TECHNOLOGIES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: CELLULAR COMMUNICATIONS EQUIPMENT LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: SAINT LAWRENCE COMMUNICATIONS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: ACACIA RESEARCH GROUP LLC, NEW YORK

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: MONARCH NETWORKING SOLUTIONS LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: MOBILE ENHANCEMENT SOLUTIONS LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: SUPER INTERCONNECT TECHNOLOGIES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: NEXUS DISPLAY TECHNOLOGIES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: AMERICAN VEHICULAR SCIENCES LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

Owner name: PARTHENON UNIFIED MEMORY ARCHITECTURE LLC, TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:053654/0254

Effective date: 20200630

AS Assignment

Owner name: R2 SOLUTIONS LLC, TEXAS

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE NAME PREVIOUSLY RECORDED ON REEL 053654 FRAME 0254. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST GRANTED PURSUANT TO THE PATENT SECURITY AGREEMENT PREVIOUSLY RECORDED;ASSIGNOR:STARBOARD VALUE INTERMEDIATE FUND LP;REEL/FRAME:054981/0377

Effective date: 20200630

AS Assignment

Owner name: STARBOARD VALUE INTERMEDIATE FUND LP, AS COLLATERAL AGENT, NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE ASSIGNOR NAME PREVIOUSLY RECORDED AT REEL: 052853 FRAME: 0153. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:R2 SOLUTIONS LLC;REEL/FRAME:056832/0001

Effective date: 20200604

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20230607